Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Computation, cryptography, and netwo...
~
Daras, Nicholas J.
Computation, cryptography, and network security
Record Type:
Electronic resources : Monograph/item
Title/Author:
Computation, cryptography, and network securityedited by Nicholas J. Daras, Michael Th. Rassias.
other author:
Daras, Nicholas J.
Published:
Cham :Springer International Publishing :2015.
Description:
ix, 756 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Engineering mathematics.
Online resource:
http://dx.doi.org/10.1007/978-3-319-18275-9
ISBN:
9783319182759$q(electronic bk.)
Computation, cryptography, and network security
Computation, cryptography, and network security
[electronic resource] /edited by Nicholas J. Daras, Michael Th. Rassias. - Cham :Springer International Publishing :2015. - ix, 756 p. :ill., digital ;24 cm.
Transformations of Cryptographic Schemes Through Interpolation Techniques (S.-A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. Koon-Ho Wong) -- Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos) -- On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellan) -- On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis) -- Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing) -- A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory (S.S. Dragomir) -- On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze) -- Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta) -- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis) -- Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang) -- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis) -- Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois) -- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla) -- A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou) -- Quantam Analogues of Hermite-Hadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka) -- Image Encryption Scheme Based on Non-Autonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.-T. Pham) -- Multiple Parameterized Yang-Hilbert-Type Integral Inequalities (B. Yang) -- Parameterized Yang-Hilbert-Type Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias) -- A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal)
Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted. This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current "state-of-the-art," and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.
ISBN: 9783319182759$q(electronic bk.)
Standard No.: 10.1007/978-3-319-18275-9doiSubjects--Topical Terms:
182072
Engineering mathematics.
LC Class. No.: TA330
Dewey Class. No.: 510
Computation, cryptography, and network security
LDR
:04666nmm a2200313 a 4500
001
476915
003
DE-He213
005
20160413114648.0
006
m d
007
cr nn 008maaau
008
160526s2015 gw s 0 eng d
020
$a
9783319182759$q(electronic bk.)
020
$a
9783319182742$q(paper)
024
7
$a
10.1007/978-3-319-18275-9
$2
doi
035
$a
978-3-319-18275-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TA330
072
7
$a
PBF
$2
bicssc
072
7
$a
MAT002010
$2
bisacsh
082
0 4
$a
510
$2
23
090
$a
TA330
$b
.C738 2015
245
0 0
$a
Computation, cryptography, and network security
$h
[electronic resource] /
$c
edited by Nicholas J. Daras, Michael Th. Rassias.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
ix, 756 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Transformations of Cryptographic Schemes Through Interpolation Techniques (S.-A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. Koon-Ho Wong) -- Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos) -- On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellan) -- On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis) -- Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing) -- A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory (S.S. Dragomir) -- On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze) -- Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta) -- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis) -- Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang) -- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis) -- Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois) -- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla) -- A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou) -- Quantam Analogues of Hermite-Hadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka) -- Image Encryption Scheme Based on Non-Autonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.-T. Pham) -- Multiple Parameterized Yang-Hilbert-Type Integral Inequalities (B. Yang) -- Parameterized Yang-Hilbert-Type Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias) -- A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal)
520
$a
Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted. This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current "state-of-the-art," and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.
650
0
$a
Engineering mathematics.
$3
182072
650
0
$a
Computer networks
$x
Security measures
$x
Mathematical models.
$3
731704
650
0
$a
Mathematics.
$3
184409
650
2 4
$a
Order, Lattices, Ordered Algebraic Structures.
$3
275673
650
2 4
$a
Number Theory.
$3
274059
650
2 4
$a
Coding and Information Theory.
$3
273763
650
2 4
$a
Approximations and Expansions.
$3
281039
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
273709
650
2 4
$a
Operations Research, Management Science.
$3
511451
700
1
$a
Daras, Nicholas J.
$3
573118
700
1
$a
Rassias, Michael Th.
$3
509927
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-18275-9
950
$a
Mathematics and Statistics (Springer-11649)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000120134
電子館藏
1圖書
電子書
EB TA330 C738 2015
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-18275-9
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login